Abstract
To make cloud computing environments more secure, this paper focuses on the security of virtualized server systems. A security layer is introduced to the secure architecture of a virtualized server as an abstraction. Because the security layer will play a key role in securing the virtualized server, there is a need for it to be sufficiently robust to tackle the most common security threats associated with cloud computing. First, security threats to cloud computing are analysed based on a publication from an international organization and the security issues surrounding virtualized servers are clarified. Following this, the security elements and their functions for each of the security requirements for virtualized servers are defined. The relationship between the security issues and security elements is then presented to verify the effectiveness of the security layer. It is shown that, using the proposed security elements, the security issues facing virtualized server systems in cloud computing are adequately mitigated. Therefore, our research will be helpful in the development of virtualized servers by making cloud computing more secure.






Similar content being viewed by others
References
Amazon Elastic Compute Cloud User Guide [Online] (2014). Available. http://aws.amazon.com. Accessed 5 Feb 2014
The NIST definition of cloud computing (2014). http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. Accessed 13 Feb 2014
Youseff L, Butrico M, Da Silva D (2008) Toward a unified ontology of cloud computing. In: The grid computing environments workshop, Austin, Texas, 12–16 Nov
Popek GJ, Goldberg RP (1974) Formal requirements for virtualizable third generation architectures. Commun ACM 17(7):412–421
Fraser K, Hand S, Neugebauer R, Pratt I, Warfield A, Williams M (2004) Safe hardware access with the Xen virtual machine monitor. In: Proceedings of 1st Workshop Oper. Syst. Architect. Support demand IT InfraStruct. Boston, pp 1–10
Whitaker A, Shaw M, Gribble SD (2002) Denali: lightweight virtual machines for distributed and networked applications. In: Tech. Rep. 02-02-01, Univ. Washington, Seattle
Nakajima J, Lin Q, Yang S, Zhu M, Gao S, Xia M, Yu P, Dong Y, Qi Z, Guan H (2011) Optimizing virtual machines using hybrid virtualization. In: Proceedings of ACM 26th SAC. Taichung, pp 573–578
Dong Y, Zhang X, Dai J, Guan H (2014) HYVI: a hybrid virtualization solution balancing performance and manageability. IEEE Trans Parallel Distrib Syst 25(9):2332–2341
Website (2014) http://www.google.com. Accessed 10 Feb 2014
Website (2014) http://code.google.com/appengine/. Accessed 10 Feb 2014
Website (2014) http://aws.amazon.com. Accessed 5 Feb 2014
Recommendation ITU-T Y.3502 (2014). Information technology—cloud computing—reference architecture
Recommendation ITU-T X.1601 (2014). Security framework for cloud computing
Lee K (2012) Security threats in cloud computing environments. Int J Security Appl 6(4)
Lee C, Kim S, Yeo Y, Moon J (2013) Proposal of security requirements based on layers and roles for the standardization of cloud computing security technology. J Security Eng 10(4)
Cloud Security Alliance (2013) The notorious nine: cloud computing top threats in 2013
European Network and Information Security Agency (2013) Threat landscape 2013
Acknowledgments
This research was supported by the ICT Standardization program of MSIP (The Ministry of Science, ICT & Future Planning).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, SK., Ma, SY. & Moon, J. A novel secure architecture of the virtualized server system. J Supercomput 72, 24–37 (2016). https://doi.org/10.1007/s11227-015-1401-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-015-1401-4